Explore Catalogue

Discover and learn from our extensive collection of world-class courses and curriculums tailored to your needs.

Found 16 results
Sort by:
Show:
Active Filters:
Category: Cybersecurity
Becoming a Cyber Warrior Certification Program

Becoming a Cyber Warrior Certification Program

Learn key skills of cybersecurity and earn a Certification from the Starweaver Institute. Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments, and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures. Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks. This program includes modules on: Part I: Building a Security Skills Foundation Part II: Leveraging Wireshark for Security Part III: Essential Defensive Strategies Part IV: Building a Cyber Range Part V: Penetration Testing Unveiled Part VI: Intrusion Analysis Part VII: Intrusion Handling

Learn key skills of cybersecurity and earn a Certification from the Starweaver Institute. Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments, and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures. Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks. This program includes modules on: Part I: Building a Security Skills Foundation Part II: Leveraging Wireshark for Security Part III: Essential Defensive Strategies Part IV: Building a Cyber Range Part V: Penetration Testing Unveiled Part VI: Intrusion Analysis Part VII: Intrusion Handling

Related To:

Product ID: OC-2024-C1G2C
Penetration Testing Unveiled: From Beginner to Advanced Technician

Penetration Testing Unveiled: From Beginner to Advanced Technician

To effectively secure the networks of today requires establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Learn to pentest and you will learn what cybersecurity is all about. In this course you will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing. You will learn the techniques to penetrate devices, servers and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skillsets increase. By the time you leave the course you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once. In this hands-on intense course, you will Learn the motives and mindset of an attacker Carry out the penetration testing methodology like a professional Explore methods to attack devices and servers Investigate the process of attacking the client side of the network Explore penetration testing Experience the process of identifying weaknesses and then attacking them Learn techniques to penetrate perimeter devices Explore the challenge of defeating enterprise defenses Practice a multitude of evasion tactics Perform penetration testing by using client side tactics Compete against a live progressive target range Enhance your professional security testing skills Develop a roadmap to becoming a professional penetration tester

To effectively secure the networks of today requires establishment of the hacker mindset. That is, you have to attack your own network to learn how to defend it. A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Learn to pentest and you will learn what cybersecurity is all about. In this course you will learn how to build and hone the skills to create that mindset of someone who has the sole purpose of attacking a system and/or network. Following the initial skill development, you will learn the process and methodology of professional penetration testing. You will learn the techniques to penetrate devices, servers and clients. Each day you will be presented a scope of work and have a number of targets to engage and attempt to “own.” The targets will be progressive in nature with the size of the attack surface being reduced as your skillsets increase. By the time you leave the course you will have performed a number of simulated professional penetration testing engagements as well as drafted a preliminary report of findings. The processes and techniques you will be exposed to have been used to train a number of global penetration testing teams. The system is proven and effective and can be put into place at once. In this hands-on intense course, you will

  • Learn the motives and mindset of an attacker
  • Carry out the penetration testing methodology like a professional
  • Explore methods to attack devices and servers
  • Investigate the process of attacking the client side of the network
  • Explore penetration testing
  • Experience the process of identifying weaknesses and then attacking them
  • Learn techniques to penetrate perimeter devices
  • Explore the challenge of defeating enterprise defenses
  • Practice a multitude of evasion tactics
  • Perform penetration testing by using client side tactics
  • Compete against a live progressive target range
  • Enhance your professional security testing skills
  • Develop a roadmap to becoming a professional penetration tester

Related To:

Product ID: OC-2024-C3W15
The Dark Web ~ Understanding and Probing Its Depths

The Dark Web ~ Understanding and Probing Its Depths

This course introduces the "Dark Web": content that exists on darknets and overlay networks that require specific tools access. This course helps you to understand who uses it, how it is accessed, and the security issues involved. The “Dark Web” is the world wide web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access. This course delivers a clear understanding of what it is, how to navigate it and the challenges involved. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.

This course introduces the "Dark Web": content that exists on darknets and overlay networks that require specific tools access. This course helps you to understand who uses it, how it is accessed, and the security issues involved. The “Dark Web” is the world wide web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access. This course delivers a clear understanding of what it is, how to navigate it and the challenges involved. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.

Related To:

Product ID: OC-2024-C1HHU
The World According to DevOps: An Introduction

The World According to DevOps: An Introduction

DevOps (a clipped compound of "development" and "operations") is a software development and delivery process that emphasizes communication and collaboration between product management, software development, and operations professionals. It supports this by automating and monitoring the process of software integration, testing, deployment, and infrastructure changes by establishing a culture and environment where building, testing, and releasing software can happen rapidly, frequently, and more reliably. Many organizations are failing software projects; their failures are often related to challenges in software development and delivery methodology(ies).  This requires the use of a different innovative more effective approach, DevOps. The DevOps approach is supported by Agile Scrum and lean practices amongst others, whereby an adaptive, incremental approach is used to deliver continuous business value, expediently. Besides the “Technical” side of DevOps, it is meant to bridge the GAP between Development and Operations Teams and establish efficiencies and remove bottlenecks and obstacles between the two groups, whether cultural or technical. DevOps is not about culture change, only! It is a business transformation as well.

DevOps (a clipped compound of "development" and "operations") is a software development and delivery process that emphasizes communication and collaboration between product management, software development, and operations professionals. It supports this by automating and monitoring the process of software integration, testing, deployment, and infrastructure changes by establishing a culture and environment where building, testing, and releasing software can happen rapidly, frequently, and more reliably. Many organizations are failing software projects; their failures are often related to challenges in software development and delivery methodology(ies).  This requires the use of a different innovative more effective approach, DevOps.
  1. The DevOps approach is supported by Agile Scrum and lean practices amongst others, whereby an adaptive, incremental approach is used to deliver continuous business value, expediently.
  2. Besides the “Technical” side of DevOps, it is meant to bridge the GAP between Development and Operations Teams and establish efficiencies and remove bottlenecks and obstacles between the two groups, whether cultural or technical.
  3. DevOps is not about culture change, only! It is a business transformation as well.

Related To:

Product ID: OC-2024-C1L04
Introduction to DevSecOps

Introduction to DevSecOps

This DevOps course is an introduction to DevSecOps and how its applied across the application development lifecycle.  This program starts with some fundamentals about what is DevOps, why DevOps is such an important part of today’s software landscape and what impact it has on systems security.  DevSecOps is a new concept brought on by DevOps and has implications all throughout the software development lifecycle.  This course explores the various aspects of DevSecOps including CI/CD, Containers, SAST, IAST, Dynamic, and scanning for secrets.  In the end we will talk about how we can begin this journey to DevSecOps and end successfully. The program contains 10 modules and 3 hours of content.

This DevOps course is an introduction to DevSecOps and how its applied across the application development lifecycle.  This program starts with some fundamentals about what is DevOps, why DevOps is such an important part of today’s software landscape and what impact it has on systems security.  DevSecOps is a new concept brought on by DevOps and has implications all throughout the software development lifecycle.  This course explores the various aspects of DevSecOps including CI/CD, Containers, SAST, IAST, Dynamic, and scanning for secrets.  In the end we will talk about how we can begin this journey to DevSecOps and end successfully. The program contains 10 modules and 3 hours of content.

Related To:

Product ID: OC-2024-C1VXH
Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field. Protocol analysis is the technique of analyzing what is or has taken place on a network and is used by Security Operations Center analysts, as well as others including network forensics investigators. In this course, we take static capture files that you will be provided and show you how to analyze each with the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

Analyzing and Defending Networks with Wireshark This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field. Protocol analysis is the technique of analyzing what is or has taken place on a network and is used by Security Operations Center analysts, as well as others including network forensics investigators. In this course, we take static capture files that you will be provided and show you how to analyze each with the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

Related To:

Product ID: OC-2024-C17JO
Introduction to Cybersecurity

Introduction to Cybersecurity

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals General overview about Cyber Security Cybersecurity market size Confusions: Cybersecurity or Cyber Security Confusions: Cybersecurity vs information security Cybersecurity professional roadmap Top cybersecurity certifications by Hacker’s techniques and motivations Understand hacker’s mindset Hackers categories What motivates hackers to hack Understand the cybersecurity kill chain Hacking techniques Malicious software used by hackers [LAB] How hackers generate malicious software [LAB] How to detect that your machine is infected and how to protect yourself Cybersecurity law and standards Laws and standards that you need to know ISO27001 NIST Framework PCI-DSS Cybersecurity USA Laws Cybersecurity EU Laws Cybersecurity Australia Laws

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals

  • General overview about Cyber Security
  • Cybersecurity market size
  • Confusions: Cybersecurity or Cyber Security
  • Confusions: Cybersecurity vs information security
  • Cybersecurity professional roadmap
  • Top cybersecurity certifications by

Hacker’s techniques and motivations Understand hacker’s mindset

  • Hackers categories
  • What motivates hackers to hack
  • Understand the cybersecurity kill chain
  • Hacking techniques
  • Malicious software used by hackers
  • [LAB] How hackers generate malicious software
  • [LAB] How to detect that your machine is infected and how to protect yourself

Cybersecurity law and standards Laws and standards that you need to know

  • ISO27001
  • NIST Framework
  • PCI-DSS
  • Cybersecurity USA Laws
  • Cybersecurity EU Laws
  • Cybersecurity Australia Laws

Related To:

Product ID: OC-2024-C18EG
Essential Guide to Cybersecurity

Essential Guide to Cybersecurity

Organizations which control, store, or transmit data are increasingly exposed to active hackers, phishing scams and other threats that arise from poor information security. Cybersecurity Essentials is the ideal course for anyone who needs to get a good all-round understanding of Cybersecurity. It provides an understanding of the fundamental principles of cybersecurity at a decision-making level. You don't have to be an aspiring security professional to do this course, it is suitable for everyone. This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.

Organizations which control, store, or transmit data are increasingly exposed to active hackers, phishing scams and other threats that arise from poor information security. Cybersecurity Essentials is the ideal course for anyone who needs to get a good all-round understanding of Cybersecurity. It provides an understanding of the fundamental principles of cybersecurity at a decision-making level. You don't have to be an aspiring security professional to do this course, it is suitable for everyone. This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.

Related To:

Product ID: OC-2024-C1FD8
Incident Response and Handling for Cyber Security Professionals

Incident Response and Handling for Cyber Security Professionals

This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others 

Related To:

Product ID: OC-2024-C1FLO
Understanding and Navigating Network Security: From A-Z

Understanding and Navigating Network Security: From A-Z

By the end of this course, you will be fully aware of the wired and wireless computer networks basics, devices, and protocols at a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the security of the network during the lectures.

By the end of this course, you will be fully aware of the wired and wireless computer networks basics, devices, and protocols at a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the security of the network during the lectures. 

Related To:

Product ID: OC-2024-C1N9G